Enhanced security using proxy signcryption technique for wireless mesh networks.
Sanjay SinglaPurushottam SharmaParveen Kumar SharmaPublished in: Int. J. Syst. Assur. Eng. Manag. (2023)
Keyphrases
- wireless mesh networks
- key management
- ad hoc networks
- bilinear pairings
- trusted third party
- signcryption scheme
- security properties
- security protocols
- wireless networks
- channel assignment
- network topology
- standard model
- mesh network
- security services
- provably secure
- information security
- routing algorithm
- security analysis
- wireless sensor networks
- security requirements
- network security
- multi channel
- multi hop
- original signer
- routing protocol
- security issues
- key distribution
- private key
- signature scheme
- diffie hellman
- access control
- blind signature scheme
- power supply
- security model
- authentication protocol
- intrusion detection
- peer to peer
- mobile ad hoc networks
- blind signature
- real time
- low cost
- public key